rity controls 12.1.4 and 12.6.2 are only implementable
with additional effort in the evaluated platforms. To
the best of our knowledge relevant research projects,
such as those extracted from the CORDIS database,
do not explicitly address these findings. Even though
some work on anomaly detection can be related to
malware prevention, the provided solutions have not
been taken up by the development community. Fur-
thermore, we have identified that topics related to the
above security controls have not been researched in
a context in which private cloud infrastructures are
preferred, such as Industry 4.0. This means that the
above topics are seen as highly relevant future re-
search and development topics. In our future work,
motivated by these findings, we will work towards se-
curity and transparency in the cloud.
ACKNOWLEDGEMENTS
The work has been performed in the project Power
Semiconductor and Electronics Manufacturing 4.0
(SemI40), under grant agreement No 692466.
REFERENCES
Gartner forecasts worldwide public cloud ser-
vices revenue to reach $260 billion in 2017.
http://www.gartner.com/newsroom/id/3815165.
Server-virtualization-software-vsphere-vmware.
https://www.vmware.com/products/vsphere.html.
Anisetti, M., Ardagna, C. A., Damiani, E., Gaudenzi, F.,
and Veca, R. (2015). Toward security and perfor-
mance certification of open stack. In Cloud Comput-
ing (CLOUD), 2015 IEEE 8th International Confer-
ence on, pages 564–571. IEEE.
Bicaku, A., Balaban, S., Tauber, M. G., Hudic, A., Mauthe,
A., and Hutchison, D. (2016). Harmonized monitor-
ing for high assurance clouds. In Cloud Engineering
Workshop (IC2EW), 2016 IEEE International Confer-
ence on, pages 118–123. IEEE.
Bleikertz, S., Vogel, C., Groß, T., and M
¨
odersheim, S.
(2015). Proactive security analysis of changes in
virtualized infrastructures. In Proceedings of the
31st annual computer security applications confer-
ence, pages 51–60. ACM.
Calder, A. and Watkins, S. G. (2013). Information security
risk management for ISO27001/ISO27002. It Gover-
nance Ltd.
Delsing, J. (2017). IoT Automation: Arrowhead Frame-
work. CRC Press.
Disterer, G. (2013). Iso/iec 27000, 27001 and 27002 for
information security management. Journal of Infor-
mation Security, 4(02):92.
Donevski, A., Ristov, S., and Gusev, M. (2013). Security as-
sessment of virtual machines in open source clouds. In
Information & Communication Technology Electron-
ics & Microelectronics (MIPRO), 2013 36th Interna-
tional Convention on, pages 1094–1099. IEEE.
Fomin, V. V., Vries, H., and Barlette, Y. (2013). Iso/iec
27001 information systems security management
standard: Exploring the reasons for low adoption.
In Proceedings of the third European conference on
Management of Technology (EuroMOT).
Gao, F. and Schneider, S. (2012). Cloud frameworks: an
information systems perspective. In Proceedings of
ConLife Academic Conference, K
¨
oln, Germany.
Henning, K. (2013). Recommendations for implementing
the strategic initiative industrie 4.0.
Hudic, A., Hecht, T., Tauber, M., Mauthe, A., and Elvira,
S. C. (2014). Towards continuous cloud service assur-
ance for critical infrastructure it. In Future Internet of
Things and Cloud (FiCloud), 2014 International Con-
ference on, pages 175–182. IEEE.
ISO/IEC (2015). Iso27017 - information technology –
security techniques – code of practice for informa-
tion security controls for cloud services. Information
technology-Security techniques.
ISO/IEC-27005 (2011). Iso/iec 27005 information
technology–security techniques–information security
risk management.
Madi, T., Majumdar, S., Wang, Y., Jarraya, Y., Pourzandi,
M., and Wang, L. (2016). Auditing security compli-
ance of the virtualized infrastructure in the cloud: Ap-
plication to openstack. In Proceedings of the Sixth
ACM Conference on Data and Application Security
and Privacy, pages 195–206. ACM.
Majumdar, S., Madi, T., Wang, Y., Jarraya, Y., Pourzandi,
M., Wang, L., and Debbabi, M. (2015). Security com-
pliance auditing of identity and access management in
the cloud: application to openstack. In Cloud Comput-
ing Technology and Science (CloudCom), 2015 IEEE
7th International Conference on, pages 58–65. IEEE.
Mell, P., Grance, T., et al. (2011). The nist definition of
cloud computing.
Montesino, R. and Fenz, S. (2011). Information security
automation: how far can we go? In Availability, Reli-
ability and Security (ARES), 2011 Sixth International
Conference on, pages 280–285. IEEE.
Nunes, B. A. A., Mendonca, M., Nguyen, X.-N., Obraczka,
K., and Turletti, T. (2014). A survey of software-
defined networking: Past, present, and future of pro-
grammable networks. IEEE Communications Surveys
& Tutorials, 16(3):1617–1634.
Ryoo, J., Rizvi, S., Aiken, W., and Kissell, J. (2014).
Cloud security auditing: challenges and emerging ap-
proaches. IEEE Security & Privacy, 12:68–74.
Stewart, J. M., Chapple, M., and Gibson, D. (2012). CISSP:
Certified Information Systems Security Professional
Study Guide. John Wiley & Sons.
Stouffer, K. A., Falco, J. A., and Scarfone, K. A. (2011). Sp
800-82. guide to industrial control systems (ics) secu-
rity: Supervisory control and data acquisition (scada)
systems, distributed control systems (dcs), and other
control system configurations such as programmable
logic controllers (plc).
Operations Security Evaluation of IaaS-Cloud Backend for Industry 4.0
399